CN107977584A - The safe copy system of desktop type - Google Patents
The safe copy system of desktop type Download PDFInfo
- Publication number
- CN107977584A CN107977584A CN201711342760.0A CN201711342760A CN107977584A CN 107977584 A CN107977584 A CN 107977584A CN 201711342760 A CN201711342760 A CN 201711342760A CN 107977584 A CN107977584 A CN 107977584A
- Authority
- CN
- China
- Prior art keywords
- safe
- desktop type
- duplicating
- task
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03G—ELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
- G03G15/00—Apparatus for electrographic processes using a charge pattern
- G03G15/50—Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control
- G03G15/5075—Remote control machines, e.g. by a host
- G03G15/5091—Remote control machines, e.g. by a host for user-identification or authorisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
Abstract
The invention discloses a kind of safe copy system of desktop type, it is related to Information Security field.The system comprises:Remote management center and the safe Photocopier device of desktop type;The safe Photocopier device of desktop type is communicated to connect by wire communication facility and the remote management center;The remote management center includes management module, duplicates control module and communication module;The safe Photocopier device of desktop type, is responsible for performing the duplicating request of user, recording and copying process, and forms duplicating daily record and be uploaded to remote management center.The safe copy system of desktop type of the present invention to the unlimited property of copying process can manage by the authentication to duplicating person, duplicating time, duplicating number control function;It is controllable to the application solutions of copy by no storage hard disk, memory Protection Counter Functions;Subsequent trace is accomplished to audit by exporting trace and content auditing function so that copy is in highly safe environment during the entire process of duplicating.
Description
Technical field
The present invention relates to Information Security field, more particularly to a kind of safe copy system of desktop type.
Background technology
Numerous and diverse suitable for the duplicator brand of desktop on the market at present, species is very much.It is functionally and multifarious but all
The multi-functional inner overwhelming majority comes into being for convenience of duplicating, and neither one is based on the function of duplicating safety.From the angle for duplicating safety
Degree, existing duplicator have the following disadvantages:
1st, existing duplicator work is opening, duplicates number and does not control, is unfavorable for the duplicating of level of confidentiality paper document, easily
Cause level of confidentiality paper document copy arbitrarily to spread, and be difficult to trace after the diffusion.
2nd, existing duplicator is made of human-computer interaction interface and scanning engine and print engine, and duplicator, which is generally in, to be treated
Machine state, under the state, the text to be duplicated need to be only positioned over scanning engine interface by user, be set in human-computer interaction interface
After duplicating number, scaling, concentration etc., startup starts, you can arbitrarily exports copy.Existing this processing mode increase copy
Probability is spread, increase file content is divulged a secret risk, and there are the secret leaking wind of disaster level for the file with security requirements for this
Danger.
The content of the invention
It is an object of the invention to provide a kind of safe copy system of desktop type, thus solve it is existing in the prior art before
State problem.
To achieve these goals, the safe copy system of desktop type of the present invention, the system comprises:In remote management
The heart and the safe Photocopier device of desktop type;The safe Photocopier device of desktop type passes through wire communication facility and the long-range pipe
Manage center to center communications connection;
The remote management center includes management module, duplicates control module and communication module;
The management module, is responsible for the safe Photocopier device of desktop type, increasing that monitoring is connected with the remote management center
Adduction deletes the user using the safe Photocopier device of desktop type, is also responsible for setting the authority of the user;, meanwhile, also
The audit log filing and encryption storage that auditor is made;
The duplicating control module, is responsible for user's identity using the safe Photocopier device of desktop type, user's quilt
Usage time, the duplicating number and current task that user is allowed to use device id, current task is allowed to is allowed to be permitted
Perhaps the monitoring of number of pages;
The communication module, the duplicating daily record encrypted transmission be responsible for receiving and upload the safe Photocopier device of desktop type are given
The management module, meanwhile, it also is responsible for setting the tactful encrypted transmission that management module issues to the safe duplicator of the desktop type
It is standby;
The safe Photocopier device of desktop type, is responsible for performing the duplicating request of user, recording and copying process, and is formed
Duplicate daily record and be uploaded to remote management center.
Preferably, management subsystem is duplicated in the safe Photocopier device installation of the desktop type, described to duplicate management subsystem
Communicated to connect with the remote management center, the management subsystem that duplicates includes:
First acquisition module:The identity ID of user is obtained, and the identity ID is sent to remote management center certification;
Second acquisition module, receives and shows the authentication result that remote management center is sent;If the identity ID is recognized
It is legal to demonstrate,prove, then show certification success, while show the identity ID remote management center pre-set and with the identity ID
Matched duplicating task;If the identity ID is certified illegal, prompt identity ID illegal;The ginseng of the duplicating task
Number includes:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver
Execution module is duplicated, is duplicated according to the duplicating tasks carrying, and in copying process, to the paper that will export
Opening addition watermark information and Quick Response Code, the information that the Quick Response Code includes in real time is:User ID, duplicate time, desktop type
Safe Photocopier device ID, duplicate number, number of copies, i.e., the number for the paper that will be exported, the paper that will export
Number of pages, the title for duplicating content, user log in the safe copy system of the desktop type and initiate the task number of task;
Daily record generation module, performs in copying process, will duplicate content, the duplicating task is fabricated to and duplicates daily record upload
To remote management center;
Understand module, when this duplicating is completed, remove automatically and all internal storage datas are produced in this copying process.
It is highly preferred that the safe Photocopier device of desktop type sets alarm, when the safe duplicator of the desktop type is set
For when illegally being opened, the alarm is directly alarmed to the remote management center.
It is highly preferred that the safe Photocopier device of desktop type obtains the body of the user by the CPU card of user
Part ID.
It is highly preferred that the safe Photocopier device of desktop type is the safe Photocopier device of desktop type of no hard disk.
It is highly preferred that the remote management center further includes:
Registration module, for receiving and preserving the log-on message of registrant;The registrant person of including the use of, auditor,
Auditor and manager, the log-on message are the essential information of registrant, include the identity ID of registrant;
Login module, is used for realization the function that registrant logs in the remote management center;
Binding module, one or more bound for receiving and preserving Photocopier device ID safe with any one desktop type
The identity ID of a user;
Task creation module, the ginseng for the duplicating task filled according to the user for signing in the remote management center
Number, establishes duplicating task, and the duplicating task is sent to management module and is examined;The parameter bag of the duplicating task
Include:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;
Authentication challenge module, for after the identity ID that the safe Photocopier device of desktop type is sent is received, the long-range pipe
Center certification identity ID legitimacies are managed, and determine to send the ID of the safe Photocopier device of desktop type of identity ID and the identity
Whether ID binds, if unbound, prompts illegal;If binding, searches identity ID and pre-establishes and pass through examination & approval
Duplicating task, and be sent to the safe Photocopier device of desktop type.
It is highly preferred that after the approver logs in the remote management center, the interior of the task to be copied that receives is checked
Hold and duplicate the parameter of task, if the parameter matching of the content of task to be copied and duplicating task, examination & approval are qualified;If treat
The content of duplicating task and the parameter mismatch for duplicating task, then examine unqualified.
Preferably, after the auditor logs in the remote management center, operation audit and content auditing are carried out:
Operation audit, on the basis of daily record is duplicated, to being uploaded to the user of remote management center to desktop type safety
Photocopier device is audited using operation, and forms audit log;
Content auditing, is checked and the content duplicated that the safe Photocopier device of desktop type of auditing uploads, and makes audit
Daily record, uploads after duplicating content and audit log encryption corresponding with duplicating content and is stored in remote management center.
Preferably, after the auditor logs in the remote management center, tactful examination & verification is carried out;
The strategy, which is audited, is:The received strategy of auditor's docking and parameter are audited, and are judged whether to meet and are set in advance
The standard that fixed examination & verification passes through, if it is, examination & verification passes through, the strategy and parameter being reviewed come into force;If examination & verification is obstructed
Cross, then the strategy of prompting examination & verification and parameter are illegal.
Preferably, the safe Photocopier device of the desktop type is specifically duplicated as steps described below:
S1, user log in the safe copy system of the desktop type and initiate task, fill in task parameters, the task ginseng
Number includes:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;The safe copy system of desktop type will
The task is sent to god and is examined by people;
S2, after passing through with task examination & approval, user shows identity ID, desktop type to the safe Photocopier device of desktop type
Safe Photocopier device to remote management center verify the identity ID whether legitimacy, if it is, into S3, if not,
Then prompt the illegal prompting of user's identity;
S4, remote management center judge that the identity ID is there are usage time limitation and/or multiple safely using desktop type
Machine equipment ID limitations are printed, if it is, inquiring about and judging whether current time is that user is allowed to use time and current table
Whether type safe Photocopier device ID in face is that user is allowed to device id, if it is, into S5;If it is not, then prompting is not
It can use and duplicate;
S5, remote principle center show that user appoints what step S1 was initiated in the safe Photocopier device of current desktop type
Business, after the agreement of user, the safe Photocopier device of desktop type performs duplicating.
The beneficial effects of the invention are as follows:
The safe copy system of desktop type of the present invention, in the case where the original copy function of duplicator is constant, realization pair
Duplicating personnel, the security control duplicated behavior, duplicate content and copier, ensure that copying process can manage, is controllable, can audit,
The safety management to copy is lifted, effectively prevents the secret leaking behavior of copying process.
The safe copy system of desktop type of the present invention passes through the authentication to duplicating person, duplicating time, duplicating number
Control function to the unlimited property of copying process can manage;By no storage hard disk, memory Protection Counter Functions to the safety of copy
Realize controllable;Subsequent trace is accomplished to audit by exporting trace and content auditing function so that copy is in the whole of duplicating
Highly safe environment is in during a.
Brief description of the drawings
Fig. 1 is the structure diagram of the safe copy system of desktop type;
Fig. 2 is the safe Photocopier device effect diagram of desktop type;
Fig. 3 is the copy example exported after duplicating;
Fig. 4 is the safe Photocopier device internal circuit composition structure diagram of desktop type.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with attached drawing, to the present invention into
Row is further described.It should be appreciated that the specific embodiments described herein are not used to only to explain the present invention
Limit the present invention.
Embodiment
With reference to Fig. 1, the safe copy system of the present embodiment desktop type includes:Remote management center and the safe duplicator of desktop type
Equipment, the safe Photocopier device of desktop type are communicated to connect by wire communication facility and the remote management center;
More detailed description:
(1) on remote management center
Remote management center is managed using separation of the three powers principle, and the administrator of management module is responsible for safe duplicator
The daily management and maintenance of equipment, the change that the auditor of auditing module is responsible for important management strategy are audited, mould of auditing
The auditor of block is responsible for auditing to the operation behavior of all personnel and the duplicating behavior of safe duplicator.Remote management center
Using B/S architecture designs.
The remote management center includes management module, duplicates control module and communication module;
The management module, is responsible for the safe Photocopier device of desktop type, increasing that monitoring is connected with the remote management center
Adduction deletes the user using the safe Photocopier device of desktop type, is also responsible for setting the authority of the user;, meanwhile, also
The audit log filing and encryption storage that auditor is made;
The duplicating control module, is responsible for user's identity using the safe Photocopier device of desktop type, user's quilt
Usage time, the duplicating number and current task that user is allowed to use device id, current task is allowed to is allowed to be permitted
Perhaps the monitoring of number of pages;
The communication module, the duplicating daily record encrypted transmission be responsible for receiving and upload the safe Photocopier device of desktop type are given
The management module, meanwhile, it also is responsible for setting the tactful encrypted transmission that management module issues to the safe duplicator of the desktop type
It is standby.
In the present embodiment, the remote management center further includes:
Registration module, for receiving and preserving the log-on message of registrant;The registrant person of including the use of, auditor,
Auditor and manager, the log-on message are the essential information of registrant, include the identity ID of registrant;
Login module, is used for realization the function that registrant logs in the remote management center;
Binding module, one or more bound for receiving and preserving Photocopier device ID safe with any one desktop type
The identity ID of a user;
Task creation module, the ginseng for the duplicating task filled according to the user for signing in the remote management center
Number, establishes duplicating task, and the duplicating task is sent to management module and is examined;The parameter bag of the duplicating task
Include:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;
Authentication challenge module, for after the identity ID that the safe Photocopier device of desktop type is sent is received, the long-range pipe
Center certification identity ID legitimacies are managed, and determine to send the ID of the safe Photocopier device of desktop type of identity ID and the identity
Whether ID binds, if unbound, prompts illegal;If binding, searches identity ID and pre-establishes and pass through examination & approval
Duplicating task, and be sent to the safe Photocopier device of desktop type.
Wherein, after the approver logs in the remote management center, check the task to be copied received content and
The parameter of duplicating task, if the parameter matching of the content of task to be copied and duplicating task, examination & approval are qualified;It is if to be copied
The content of task and the parameter mismatch for duplicating task, then examine unqualified.
Wherein, after the auditor logs in the remote management center, operation audit and content auditing are carried out:Operation is examined
Meter, on the basis of daily record is duplicated, uses the safe Photocopier device of desktop type the user for being uploaded to remote management center
Operation is audited, and forms audit log;Content auditing, is checked and duplicating that the safe Photocopier device of desktop type of auditing uploads
The content crossed, and audit log is made, upload and store after content and audit log encryption corresponding with duplicating content will be duplicated
In remote management center.
Wherein, after the auditor logs in the remote management center, tactful examination & verification is carried out;The strategy, which is audited, is:Examine
The received strategy of core person's docking and parameter are audited, and judge whether to meet the standard set in advance audited and passed through, if so,
Then examination & verification passes through, and the strategy and parameter being reviewed come into force;If examination & verification is not by prompting the tactful and parameter of examination & verification not
It is legal.
Strategy and parameter include the use of people, usage time, watermark information and warning message, these information are set by administrator
Fixed, administrator cannot come into force after setting, it is necessary to which auditor can just come into force after auditing approval.Administrator and auditor
Difference:Administrator is responsible for carrying out regular maintenance to desktop type safe copy system, including equipment increases and decreases, user
Member's increases and decreases.But these operations of administrator, will not come into force, it is necessary to which auditor's examination & verification can just give birth to after passing through
Effect.
(2) the safe Photocopier device of desktop type
The safe Photocopier device of desktop type, the duplicating after module examination & verification passes through that is managed for being responsible for performing user are asked
Ask, recording and copying process, and form duplicating daily record and be uploaded to remote management center.The safe Photocopier device of desktop type is the system
The executing agency of system, is responsible for the duplicating demand to user and is accurately performed, and user's copying process is recorded, and is formed
Log transmission is to remote management center, in case auditor's later audit.
In the present embodiment, management subsystem is duplicated in the safe Photocopier device installation of desktop type, described to duplicate management
System is communicated to connect with the remote management center, and the management subsystem that duplicates includes:
First acquisition module:The identity ID of user is obtained, and the identity ID is sent to remote management center certification;
Second acquisition module, receives and shows the authentication result that remote management center is sent;If the identity ID is recognized
It is legal to demonstrate,prove, then show certification success, while show the identity ID remote management center pre-set and with the identity ID
Matched duplicating task;If the identity ID is certified illegal, prompt identity ID illegal;The ginseng of the duplicating task
Number includes:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver
Execution module is duplicated, is duplicated according to the duplicating tasks carrying, and in copying process, to the paper that will export
Opening addition watermark information and Quick Response Code, the information that the Quick Response Code includes in real time is:User ID, duplicate time, desktop type
Safe Photocopier device ID, duplicate number, be number of copies, current number just in print paper, current just in print paper
Number of pages, the title for duplicating content, user log in the safe copy system of the desktop type and initiate the task number of task;
Daily record generation module, performs in copying process, will duplicate content, the duplicating task is fabricated to and duplicates daily record upload
To remote management center;
Understand module, when this duplicating is completed, remove automatically and all internal storage datas are produced in this copying process.
In the present embodiment, Quick Response Code is by according to the task information actually duplicated, (task information includes duplicating
Fraction, number of copies, the fraction of current paper sheet, the number of pages of current paper sheet, task number, duplicating personal information, title) add in real time
Add, and the paper of every copy has difference, also supports to add in the homepage of a copy or every page is all added.It is existing
A Quick Response Code is previously generated when having technology essentially to receive duplicating task, all copy paper of the task are increased same
Quick Response Code.
In the present embodiment, the safe Photocopier device of desktop type sets alarm, when the safe duplicator of the desktop type
When equipment is illegally opened, the alarm is directly alarmed to the remote management center.
In the present embodiment, the safe Photocopier device of desktop type obtains the user's by the CPU card of user
Identity ID.
In the present embodiment, the safe Photocopier device of desktop type is the safe Photocopier device of desktop type of no hard disk.
In the present embodiment, the safe Photocopier device of desktop type is specifically duplicated as steps described below:
S1, user log in the safe copy system of the desktop type and initiate task, fill in task parameters, the task ginseng
Number includes:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;The safe copy system of desktop type will
The task is sent to god and is examined by people;
S2, after passing through with task examination & approval, user shows identity ID, desktop type to the safe Photocopier device of desktop type
Safe Photocopier device to remote management center verify the identity ID whether legitimacy, if it is, into S3, if not,
Then prompt the illegal prompting of user's identity;
S4, remote management center judge that the identity ID is there are usage time limitation and/or multiple safely using desktop type
Machine equipment ID limitations are printed, if it is, inquiring about and judging whether current time is that user is allowed to use time and current table
Whether type safe Photocopier device ID in face is that user is allowed to device id, if it is, into S5;If it is not, then prompting is not
It can use and duplicate;
S5, remote principle center show that user appoints what step S1 was initiated in the safe Photocopier device of current desktop type
Business, after the agreement of user, the safe Photocopier device of desktop type performs duplicating.
With reference to Fig. 2, in the present embodiment, Fig. 2 be the safe Photocopier device design sketch of desktop type, aobvious in the case of normal Standby
Display screen is shown for a long time【It please swipe the card ...】Unauthorized user can not open duplicator at this time, and effectively card is swiped the card after, desktop type
Safe Photocopier device can duplicate the relevant parameter information such as number according to the approval results automatic pre-set of remote management center, use
Person need to only perform startup and duplicate.The copy exported after duplicating such as Fig. 3;Left on the copy of output preset
Quick Response Code and watermark information, for tracking source and the importance of watchful user of service's this document.Duplicator is in output copy
While can upload the relevant informations such as duplicating personnel, number, machine number automatically, with for subsequent log audit.
With reference to Fig. 4, the safe Photocopier device internal circuit composition structure of desktop type, the safe copier structure of desktop type includes
Scanning engine, print engine, driving plate, master control borad, power panel, interface board and UI interactive interfaces.Scanning engine function is to pass through
Paper document is converted into high-resolution e-file by accurate optics;Print engine is mainly responsible for paper document
By on laser transfer to paper;Master control borad is mainly used for that user logic and each module operating flow are handled and controlled.Drive
Movable plate is for being driven to correlation engine so that mechanical equipment is precisely run under software program.Interface board is mainly used
In externally progress data interaction and power supply supply;UI interactive interfaces are mainly used for parameter input and shape between user and machine
State is inquired about.
Desktop type strengthens safely mechanically and electrically submodule of the duplicator by high-precision, in the accurate of embedded software
Safe copy function is realized under scheduling so that the copying process of paper document is able to maximum safeguard protection.
Function on herein described system is discussed in detail:
1. authentication:
Secure private duplicator is using the close CPU card of state as authentication unique channel.Duplicator, will after start completion
Into interface is welcome, to unauthenticated or authentification failure user, which can not show copy machine operation related key, wait to pass through
After CPU card certification, it can be configured to duplicating parameter, including:Number, scaling, gray scale etc..CPU card authentication, Ke Yiqi
To the controllable management to duplicator.
2. memory is reset
Secure private duplicator is after each duplicating flow, it will the mediant to being produced in operational process automatically
According to memory clearing is carried out, avoid because memory produces leakage of data.
3. without hard disk
Secure private Photocopier device without hard disk design, avoids the landing of data from storing in itself, reduces what is produced by hard disk
Leakage of data.
4. export trace
Secure private duplicator can presetting according to administrative staff, to output paper document carry out force addition water
Official seal ceases and two-dimensional bar code, the wherein word content of watermark information, size, transparency, gradient, position etc. can freely be set
It is fixed;2 D code information includes duplicating personnel, duplicates time, duplicator numbering, duplicates number, copy numbering etc..
4. number controls
Secure private duplicator in use, can combine administrative center, to the current duplicating number for duplicating personnel
Or number of copies carries out upper limit control, reduce user of service and arbitrarily use duplicator, avoid duplicating divulging a secret for generation because unrestricted.
And it can also play a role to energy conservation and environmental protection.
6. time control
Secure private duplicator can carry out time restriction to duplicating personnel, avoid duplicating personnel in inoperative or unauthorized
Special duplicator safe to use in time, plays the role of to duplicating management and control.
7. operation audit
Operation audit includes use operation of operation and duplicating personnel of the administrative staff to whole system to duplicator.Audit
Member can be checked and be audited by logging in operation note of the Audit Module to the above persons.
8. content auditing
Auditor to the file content duplicated can check audit in system by logging in Audit Module, in file
Appearance uploads to administrative center in an encrypted form, and by encrypting document form storage and management center, and the functions of modules
Can be by client's sets itself whether enabling.
9. trace to its source
Auditor can carry out two dimension by the function of tracing to its source of logging in Audit Module to the paper document exported
Code scanning, and can check the duplicating personnel of this document, duplicator numbering, duplicate number, current copy numbering and duplicate when
Between etc. information.
Workflow on herein described system mainly presses following steps:
A1, task are initiated:Duplicating personnel fill in hard-copy file title, code, close as requested by logging in management system
After the information such as level, number, number of pages, approver, which can be pushed to related personnel by system automatically.
A2, task examination & approval:After duplicating task is duplicated people's initiation, system will notify approver in the form of bubble, examination & approval
People can check current task content, and voluntarily judge whether that examination & approval pass through
A3, task are got:After task examination & approval pass through, the database of administrative center can be voluntarily stored in a manner of encrypted,
Task promoter need to hold effective ID card and swiping card is performed on specified duplicator, after duplicator verification identity success, Shen
Please the current all duplicating tasks for duplicating personnel are transferred from administrative center's database.Duplicate personnel selection task and click on and get i.e.
Can.
A4, perform task:Duplicator can duplicate parameter, bag after user gets task according to task definition, voluntarily adjustment
Include and duplicate the relevant informations such as number, number of pages and perform duplicating working.While duplicating, duplicator can be according to strategy by duplicating
Appearance and status log, pass back to administrative center in an encrypted form.
A5, log audit:Administrative center will store System Operation Log and user's usage log in an encrypted form,
Auditor can be checked and audited to information above with login system.
By using above-mentioned technical proposal disclosed by the invention, following beneficial effect has been obtained:
The safe copy system of desktop type of the present invention, in the case where the original copy function of duplicator is constant, realization pair
Duplicating personnel, the security control duplicated behavior, duplicate content and copier, ensure that copying process can manage, is controllable, can audit,
The safety management to copy is lifted, effectively prevents the secret leaking behavior of copying process.
The safe copy system of desktop type of the present invention passes through the authentication to duplicating person, duplicating time, duplicating number
Control function to the unlimited property of copying process can manage;By no storage hard disk, memory Protection Counter Functions to the safety of copy
Realize controllable;Subsequent trace is accomplished to audit by exporting trace and content auditing function so that copy is in the whole of duplicating
Highly safe environment is in during a.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should
Depending on protection scope of the present invention.
Claims (10)
- A kind of 1. safe copy system of desktop type, it is characterised in that the system comprises:Remote management center and desktop type safety Photocopier device;The safe Photocopier device of desktop type passes through wire communication facility and the remote management center communication link Connect;The remote management center includes management module, duplicates control module and communication module;The management module, be responsible for monitoring be connected with the remote management center the safe Photocopier device of desktop type, increase and The user using the safe Photocopier device of desktop type is deleted, is also responsible for setting the authority of the user;, meanwhile, it will also examine The audit log filing and encryption storage that meter person makes;The duplicating control module, is responsible for being allowed to user's identity using the safe Photocopier device of desktop type, user It is duplicating number and current task is allowed to that usage time, user are allowed to use device id, current task is allowed to The monitoring of number of pages;The communication module, the duplicating daily record encrypted transmission be responsible for receiving and upload the safe Photocopier device of desktop type is to described Management module, meanwhile, it also is responsible for the tactful encrypted transmission that management module issues to the safe Photocopier device of the desktop type;The safe Photocopier device of desktop type, is responsible for performing the duplicating request of user, recording and copying process, and forms duplicating Daily record is uploaded to remote management center.
- 2. the safe copy system of desktop type according to claim 1, it is characterised in that the safe Photocopier device of desktop type Management subsystem is duplicated in installation, and the management subsystem that duplicates is communicated to connect with the remote management center, described to duplicate management Subsystem includes:First acquisition module:The identity ID of user is obtained, and the identity ID is sent to remote management center certification;Second acquisition module, receives and shows the authentication result that remote management center is sent;If the identity ID is certified conjunction Method, then show certification success, while shows that the identity ID pre-sets in remote management center and matched with the identity ID Duplicating task;If the identity ID is certified illegal, prompt identity ID illegal;The parameter bag of the duplicating task Include:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approverExecution module is duplicated, is duplicated according to the duplicating tasks carrying, and in copying process, to the paper reality that will export Shi Tianjia watermark informations and Quick Response Code, the information that the Quick Response Code includes are:User ID, duplicate time, desktop type safety Photocopier device ID, duplicate number, number of copies, the number for the paper that will export, the paper that will export number of pages, Duplicate the title of content, user logs in the safe copy system of the desktop type and initiates the task number of task;Daily record generation module, performs in copying process, will duplicate content, the duplicating task is fabricated to duplicating daily record and is uploaded to far Thread management center;Understand module, when this duplicating is completed, remove automatically and all internal storage datas are produced in this copying process.
- 3. the safe copy system of desktop type according to claim 2, it is characterised in that the safe Photocopier device of desktop type Alarm is set, and when the safe Photocopier device of the desktop type is illegally opened, the alarm is directly to the long-range pipe Alarm at reason center.
- 4. the safe copy system of desktop type according to claim 2, it is characterised in that the safe Photocopier device of desktop type The identity ID of the user is obtained by the CPU card of user.
- 5. the safe copy system of desktop type according to claim 1, it is characterised in that the safe Photocopier device of desktop type For the safe Photocopier device of desktop type of no hard disk.
- 6. the safe copy system of desktop type according to claim 1, it is characterised in that the remote management center further includes:Registration module, for receiving and preserving the log-on message of registrant;The registrant person of including the use of, auditor, audit Member and manager, the log-on message are the essential information of registrant, include the identity ID of registrant;Login module, is used for realization the function that registrant logs in the remote management center;Binding module, the one or more for receiving and preserving Photocopier device ID bindings safe with any one desktop type make The identity ID of user;Task creation module, the parameter for the duplicating task filled according to the user for signing in the remote management center, builds Vertical duplicating task, and the duplicating task is sent to management module and is examined;The parameter of the duplicating task includes:Answered Title, code, level of confidentiality, number, number of pages and the approver of printed text part;Authentication challenge module, for after the identity ID that the safe Photocopier device of desktop type is sent is received, in the remote management Heart certification identity ID legitimacies, and determine that the ID and identity ID that send the safe Photocopier device of desktop type of identity ID are No binding, if unbound, is prompted illegal;If binding, search identity ID and pre-establish and answering by examination & approval Print task, and it is sent to the safe Photocopier device of desktop type.
- 7. the safe copy system of desktop type according to claim 6, it is characterised in that the approver logs in the long-range pipe Behind reason center, check the task to be copied received content and duplicate task parameter, if the content of task to be copied and The parameter matching of duplicating task, then examination & approval are qualified;If the content of task to be copied and the parameter mismatch for duplicating task, are examined Criticize unqualified.
- 8. the safe copy system of desktop type according to claim 1, it is characterised in that the auditor logs in the long-range pipe Behind reason center, operation audit and content auditing are carried out:Operation audit, on the basis of daily record is duplicated, duplicates safely desktop type the user for being uploaded to remote management center Machine equipment is audited using operation, and forms audit log;Content auditing, is checked and the content duplicated that the safe Photocopier device of desktop type of auditing uploads, and makes audit log, Uploaded after content and audit log encryption corresponding with duplicating content will be duplicated and be stored in remote management center.
- 9. the safe copy system of desktop type according to claim 1, it is characterised in that the auditor logs in the long-range pipe Behind reason center, tactful examination & verification is carried out;The strategy, which is audited, is:The received strategy of auditor's docking and parameter are audited, and judge whether to meet set in advance The standard passed through is audited, if it is, examination & verification passes through, the strategy and parameter being reviewed come into force;If examination & verification not by, The strategy and parameter of prompting examination & verification are illegal.
- 10. the safe copy system of desktop type according to claim 1, it is characterised in that the safe duplicator of desktop type is set It is standby specifically to be duplicated as steps described below:S1, user log in the safe copy system of the desktop type and initiate task, fill in task parameters, the task parameters bag Include:By the title of hard-copy file, code, level of confidentiality, number, number of pages and approver;The safe copy system of desktop type is by described in Task is sent to god and is examined by people;S2, after passing through with task examination & approval, user shows identity ID, desktop type safety to the safe Photocopier device of desktop type Photocopier device to remote management center verify the identity ID whether legitimacy, if it is, into S3, if it is not, then carrying Show the illegal prompting of user's identity;S4, remote management center judge that the identity ID is there are usage time limitation and/or uses the safe duplicator of desktop type Device id limits, if it is, inquiring about and judging whether current time is that user is allowed to use time and current desktop type Whether safe Photocopier device ID is that user is allowed to device id, if it is, into S5;If it is not, then prompting cannot make With duplicating;S5, remote principle center show the task that user initiates in step S1 in the safe Photocopier device of current desktop type, After the agreement of user, the safe Photocopier device of desktop type performs duplicating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711342760.0A CN107977584A (en) | 2017-12-14 | 2017-12-14 | The safe copy system of desktop type |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711342760.0A CN107977584A (en) | 2017-12-14 | 2017-12-14 | The safe copy system of desktop type |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107977584A true CN107977584A (en) | 2018-05-01 |
Family
ID=62006568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711342760.0A Pending CN107977584A (en) | 2017-12-14 | 2017-12-14 | The safe copy system of desktop type |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107977584A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108762013A (en) * | 2018-06-27 | 2018-11-06 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108803279A (en) * | 2018-06-27 | 2018-11-13 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108803278A (en) * | 2018-06-27 | 2018-11-13 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108828918A (en) * | 2018-06-27 | 2018-11-16 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108845486A (en) * | 2018-06-27 | 2018-11-20 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108845482A (en) * | 2018-06-27 | 2018-11-20 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108873643A (en) * | 2018-06-27 | 2018-11-23 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN109753254A (en) * | 2019-01-11 | 2019-05-14 | 中国人民解放军国防科技大学 | Duplicator secrecy management and control system based on RFID |
CN113341803A (en) * | 2021-06-02 | 2021-09-03 | 北京鼎普科技股份有限公司 | Safety copying control system and method |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101686294A (en) * | 2009-08-10 | 2010-03-31 | 北京立思辰新技术有限公司 | Embedded type file information security management system |
CN201974640U (en) * | 2010-12-15 | 2011-09-14 | 河北汉光重工有限责任公司 | Security-enhanced copier |
CN102541482A (en) * | 2010-12-27 | 2012-07-04 | 北大方正集团有限公司 | Method and system for document printing control and document tracing |
CN102749874A (en) * | 2012-06-14 | 2012-10-24 | 北京立思辰计算机技术有限公司 | Duplicating monitoring system |
CN102880101A (en) * | 2012-08-30 | 2013-01-16 | 北京立思辰计算机技术有限公司 | Full-loop-locked copying safety monitoring device and method |
CN102880831A (en) * | 2012-08-27 | 2013-01-16 | 北京立思辰计算机技术有限公司 | Method for securely copying confidential paper |
CN104598596A (en) * | 2015-01-23 | 2015-05-06 | 王小安 | Paperless file system |
CN105187220A (en) * | 2015-10-26 | 2015-12-23 | 南威软件股份有限公司 | Centralized script material printing management system |
CN106557285A (en) * | 2015-09-25 | 2017-04-05 | 腾讯科技(深圳)有限公司 | Method of printing and device |
CN107066844A (en) * | 2017-04-12 | 2017-08-18 | 李晓妮 | A kind of method and apparatus of paper document security management and control and tracing |
-
2017
- 2017-12-14 CN CN201711342760.0A patent/CN107977584A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101686294A (en) * | 2009-08-10 | 2010-03-31 | 北京立思辰新技术有限公司 | Embedded type file information security management system |
CN201974640U (en) * | 2010-12-15 | 2011-09-14 | 河北汉光重工有限责任公司 | Security-enhanced copier |
CN102541482A (en) * | 2010-12-27 | 2012-07-04 | 北大方正集团有限公司 | Method and system for document printing control and document tracing |
CN102749874A (en) * | 2012-06-14 | 2012-10-24 | 北京立思辰计算机技术有限公司 | Duplicating monitoring system |
CN102880831A (en) * | 2012-08-27 | 2013-01-16 | 北京立思辰计算机技术有限公司 | Method for securely copying confidential paper |
CN102880101A (en) * | 2012-08-30 | 2013-01-16 | 北京立思辰计算机技术有限公司 | Full-loop-locked copying safety monitoring device and method |
CN104598596A (en) * | 2015-01-23 | 2015-05-06 | 王小安 | Paperless file system |
CN106557285A (en) * | 2015-09-25 | 2017-04-05 | 腾讯科技(深圳)有限公司 | Method of printing and device |
CN105187220A (en) * | 2015-10-26 | 2015-12-23 | 南威软件股份有限公司 | Centralized script material printing management system |
CN107066844A (en) * | 2017-04-12 | 2017-08-18 | 李晓妮 | A kind of method and apparatus of paper document security management and control and tracing |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108762013A (en) * | 2018-06-27 | 2018-11-06 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108803279A (en) * | 2018-06-27 | 2018-11-13 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108803278A (en) * | 2018-06-27 | 2018-11-13 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108828918A (en) * | 2018-06-27 | 2018-11-16 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108845486A (en) * | 2018-06-27 | 2018-11-20 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108845482A (en) * | 2018-06-27 | 2018-11-20 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN108873643A (en) * | 2018-06-27 | 2018-11-23 | 阜阳市金天数码科技有限公司 | A kind of duplicator |
CN109753254A (en) * | 2019-01-11 | 2019-05-14 | 中国人民解放军国防科技大学 | Duplicator secrecy management and control system based on RFID |
CN113341803A (en) * | 2021-06-02 | 2021-09-03 | 北京鼎普科技股份有限公司 | Safety copying control system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107977584A (en) | The safe copy system of desktop type | |
CN105049659B (en) | Image processing system and information processing method | |
CN104717389B (en) | Information processor and its control method | |
JP4323098B2 (en) | A signature system that verifies the validity of user signature information | |
US20210191671A1 (en) | Intelligent seal with cloud computing-based anti-forgery capability | |
CN101097416B (en) | Printing system, printing control method | |
CN101686294B (en) | Embedded type file information security management system | |
CN108174049A (en) | Image forms auditing method, system and image formation system | |
CN108830502A (en) | A kind of seal system | |
CN101377731A (en) | Method and terminal for controlling document print | |
CN107977174A (en) | Cloud print system and method based on wechat barcode scanning certification | |
CN110471632A (en) | File printout, inspection method, device, electronic equipment and readable storage medium storing program for executing | |
KR20180066500A (en) | Apparatus and Method for signing electronic contract using digital official seal | |
CN104202304A (en) | Method for certificating the seal by third party, and seal certification system based on the method | |
CN108206803A (en) | Business acts on behalf processing method and processing device | |
CN107205102A (en) | Information processor and control method | |
CN110580406B (en) | Internet file self-help importing system and method | |
CN102749874A (en) | Duplicating monitoring system | |
CN109063503A (en) | A kind of watermark embedding apparatus and method | |
JP5531521B2 (en) | Document management system, document operation device, and program | |
CN109902458A (en) | A kind of method and apparatus of document print control | |
TWM520159U (en) | Device for generating and identifying electronic document containing electronic authentication and paper authentication | |
CN111984957A (en) | Confidential document identification and tracking system based on fingerprint anti-counterfeiting | |
CN101616148B (en) | Internet transaction identity authentication method and device | |
CA2522905A1 (en) | Self-enrollment and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180501 |